It is time again for a look at home video software. Pinnacle Systems offers Emmy award winning video editing software. Listen in to Geek Speak to learn about the latest and greatest solutions offered by Pinnacle Systems.
Pinnacle Systems’ Studio 8.0 is a total video-editing solution for your desktop or laptop PC. With it, you can capture your video footage from nearly any digital or analog source and then employ professional editing features like scene transitions, title effects, and fast/slow motion to create amazing movies. Once you’ve created your video, you can output to tape or burn your movies to CDs or DVDs that will play on most DVD players. Studio 8.0 makes editing movies easier than ever. Simply drag and drop your captured video footage onto the editing timeline and assemble a movie in mere minutes. Advanced users can edit video frame by frame and see the results instantly in a preview window. Add professional 3-D scene transitions, background music imported from MP3s or CDs, title effects, and you’re ready to show the world your magnum opus. You can share your videos with family and friends by creating Video CDs or DVDs. With Studio 8.0, you can burn a disc with your CD or DVD burner that will play in most DVD players. Studio 8.0 also includes advanced authoring features that allow you to create multiple linked menus, motion menus, and motion buttons.
Indisputably the most famous and infamous hacker joins the Geeks to talk
about his new book, The Art of Deception: Controlling the Human Element of Security.
The world’s most famous computer hacker and cybercult hero,
once the subject of a massive FBI manhunt for computer fraud, has written a
blueprint for system security based on his own experiences. Mitnick, who was
released from federal prison in 1998 after serving a 22-month term, explains that
unauthorized intrusion into computer networks is not limited to exploiting security
holes in hardware and software. He focuses instead on a common hacker technique
known as social engineering in which a cybercriminal deceives an individual into
providing key information rather than trying to use technology to reveal it.
Mitnick illustrates the tactics comprising this “art of deception” through
actual case studies, showing that even state-of-the-art security software
can’t protect businesses from the dangers of human error. With Mitnick’s
recommended security policies, readers gain the information their organizations
need to detect and ward off the threat of social engineering. Required reading for
IT professionals, this book is highly recommended for public, academic, and corporate libraries.